One of the mythologies surrounding Zero Trust is that it is difficult and expensive to implement. Not true! In this webcast, John Kindervag, Founder of Zero Trust and Field CTO at Palo Alto Networks and Scott Stevens, SVP Global Systems Engineering at Palo Alto Networks debunk this myth.

Join us for this webcast and learn:
•How Zero Trust is easy to implement using an iterative approach designed to mitigate disruption or downtime
•The five key steps to implementation
•Why Zero Trust is easy to measure, including maturity metrics for Zero Trust

One of the mythologies surrounding Zero Trust is that it is difficult and expensive to implement. Not true! In this webcast, John Kindervag, Founder of Zero Trust and Field CTO at Palo Alto Networks and Scott Stevens, SVP Global Systems Engineering at Palo Alto Networks will debunk this myth.

Join us for this webcast and learn:
•How Zero Trust is easy to implement using an iterative approach designed to mitigate disruption or downtime
•The five key steps to implementation
•Why Zero Trust is easy to measure, including maturity metrics for Zero Trust

Enterprises are deploying SD-WAN, at an increasingly faster pace, as an important first step towards building optimized environments that are ready for multi-cloud world. As a platform, SD-WAN is a solid first step in deploying edge security applications and services with additional security functions like next-generation firewall (NGFW), intrusion prevention, SSL inspection, web filtering, DNS security, and malware analysis needed as well. In this webinar, we will discuss how VMware SD-WAN by Velocloud lays the foundation for SD-WAN and how Palo Alto Networks VM-Series and GlobalProtect security products complement and strengthen overall security to help organizations prevent successful cyberattacks. We will also discuss how Intel architecture, network and security specific hardware and software technologies help these workloads operate in a consistent, saleable and high performance way.

DNS is wide open for attackers. Security teams are under pressure to enforce consistent protections for millions of new malicious domains while keeping up with advanced tactics like DNS tunneling. How can you take back control of your DNS traffic and prevent these threats?

Join Palo Alto Networks experts to see:
• How real-world threats found by Unit 42 use DNS for command-and-control and data theft.
• A detailed demo of how the new DNS Security service disrupts attacks that use DNS.
• Best practices for protecting DNS traffic to keep your organization safe.

You’ll also get your questions answered in our live Q&A when you join us for this interactive session. Learn what you should be doing to protect your DNS traffic today—and how to stay ahead of emerging tactics.

With the growing sophistication and speed of cyber-attacks, you need the confidence to know that your endpoint protection has you covered. Your job isn’t getting easier, so we keep making Traps better. The Traps team has announced new features which fundamentally change how Traps is deployed and managed. In this webinar we’ll cover:
•An update on the latest threat landscape trends
•Overview of the new features of Traps 6.0
•How you can take action and upgrade now

As DevSecOps adoption slowly goes mainstream among organizations, it is fundamentally changing the culture and collaboration semantics among security, development and operations teams.
This webinar will explore whether SecOps and DevOps have been effective in fostering collaboration to align their different goals into a single effort or have they slipped into implementing primitive security models of the past. Is the union of DevOps and SecOps on rocky ground and in need of marriage counseling, or are they copacetic? In this webinar, we’ll explore the needs of DevOps, Security and IT and five principles that will help you move at the speed of cloud together without creating gaps in your security posture.

As organizations adopt public cloud to accelerate development and reduce reliance on traditional datacenters, risk management remains a top concern. It’s well understood that legacy security tools designed for the datacenter cannot adapt to the distributed, dynamic nature of cloud environments, but what about the security tools offered by the cloud providers? Can they offer the visibility and control needed to effectively manage risk and mitigate vulnerabilities? We take a deep dive into native cloud security to see how these tools work and uncover if they can effectively support the differing security requirements across SecOps, DevOps, and compliance teams.

The good news is that AWS, GCP and Azure provide better core security than your data center could ever provide. The bad news is that your users can also provision a complete stack with only a few clicks... without any security oversight. This session will dissect the latest cloud-based high-profile breaches and highlight four critical steps organizations of all sizes can take to prevent them.

Too often, organizations make the move to the cloud without considering the impact to compliance. Whether compliance serves regulatory or business obligations, it is best to move into the cloud with these requirements in mind. In this webinar, our experts will discuss common cloud compliance misconceptions, practical advice about how to get your cloud compliance program in the best shape possible.

DNS is wide open for attackers. Security teams are under pressure to enforce consistent protections for millions of new malicious domains while keeping up with advanced tactics like DNS tunneling. How can you take back control of your DNS traffic and prevent these threats?

You’ll also get your questions answered in our live Q&A when you join us for this interactive session. Learn what you should be doing to protect your DNS traffic today—and how to stay ahead of emerging tactics.

Speakers: Matt Bromiley, Certified Trainer at the SANS Institute, and John Martinez, Director of Public Cloud R&D at Palo Alt

According to Gartner, through 2020, 95 percent of cloud security failures will be the customer’s fault. Much like the human body, the cloud is continuously evolving and changing. To ensure an optimal state of cloud operations and to defend your cloud environment from menacing threats requires conditioning and ongoing commitment. In this webinar, we’ll highlight twelve cloud security and compliance “exercises” that are critical for keeping your organization’s data and systems secure in Amazon Web Services (AWS).

Colleges and Universities are making the trek to the cloud. Most often, that first step is toward Google Suite, Office 365, Box.com or similar cloud services. While these services provide great value and flexibility for the modern college environment, they present risk of inadvertent data exposure or data breach without providing the visibility into how and where that data is shared. These services are incredibly valuable but without that visibility, IT Administrators are blind to the potential issues inherent to the platforms.

Join us for a live webinar where we will have a panel discussion with to learn how, in these different environments, they safely enable the use of SaaS applications and:

• Quickly gain visibility and granular, context-based control of SaaS applications, whether sanctioned or unsanctioned.
• Protect school or university data from malicious and inadvertent exposure after it has left the campus.
• Satisfy compliance requirements while still maintaining the benefits of SaaS based application services.

Find out how your peers take charge of their SaaS environments, those that they enabled or those that they inherited by end users.

App-ID increases the value of our next-generation firewalls by making it easier and faster to determine the exact identity of applications traversing the network, enabling teams to set and enforce the right policies.

Join Palo Alto Networks experts and learn how you can use the New Policy Optimizer capability to migrate your legacy rule set to App-ID based rules.

In this session, you will:
•Learn best practices for rule management
•Find out how Policy Optimizer can help you achieve a more secure and easier to manage security rule set
•Learn how App-ID can reduce complexity and minimize human error, the leading cause of data breaches
•Get your questions answered in our live Q&A

There’s a shift underway in branch networking. Backhauling branch office traffic to HQ made sense when accessing data center application, but does this approach still make sense? SaaS and Cloud have fundamentally changed how we use applications and access data. With the high cost of maintaining MPLS and the need to access applications in the cloud, organizations are looking for options to use SD-WAN or access the internet directly from the branch. But how do you do that safely, without watering down the protection?

Join our Palo Alto Networks experts and learn how you can safely route branch traffic directly to the internet while ensuring the same levels of security that you expect for all your users. You will:

•Get details on the scenarios for branch security
•Learn about what does and doesn’t work
•Find out how to deploy a flexible set of security options to cover your requirements
•Get your questions answered by the experts in our Q&A

Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.